US20050080906A1 - Methods and apparatus for providing access to persistent application sessions - Google Patents

Methods and apparatus for providing access to persistent application sessions Download PDF

Info

Publication number
US20050080906A1
US20050080906A1 US10683548 US68354803A US2005080906A1 US 20050080906 A1 US20050080906 A1 US 20050080906A1 US 10683548 US10683548 US 10683548 US 68354803 A US68354803 A US 68354803A US 2005080906 A1 US2005080906 A1 US 2005080906A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
application
user
server
plurality
application sessions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10683548
Other versions
US7594018B2 (en )
Inventor
Bradley Pedersen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citrix Systems Inc
Original Assignee
Citrix Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/1002Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers, e.g. load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/14Network-specific arrangements or communication protocols supporting networked applications for session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/1002Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers, e.g. load balancing
    • H04L67/1038Load balancing arrangements to avoid a single path through a load balancer

Abstract

Methods and apparatus for providing remote access to two or more application sessions in which authentication information associated with a user is received, a plurality of application sessions already associated with the user are identified in response to the information, and a client computer operated by the user is connected to the plurality of application sessions.

Description

    TECHNICAL FIELD
  • The present invention generally relates to computer networking software, and more specifically to methods and apparatus for providing access to persistent application sessions.
  • BACKGROUND
  • Technologies for providing remote access to networked resources include a variety of server/client software combinations. MetaFrame™ server software in communication with Intelligent Computing Architecture (ICA) clients, available from Citrix Systems, Inc., Ft. Lauderdale, Fla., and X Servers in communication with X Windows clients available from the X Consortium are two examples that provide remote access to applications executing on a server.
  • Computer user behavior and the stability of network communication channels over which their computers communicate are often unpredictable. Networked users on occasion need to change computing environments while forgetting to, or without having the opportunity to fully save their work product or to shut down their systems. In other cases, communication channels unexpectedly fail or computers crash, which can result in the loss of work product, if the session is not restored or terminated gracefully.
  • Failing to gracefully cease usage of a shared network resource can lead to a variety of difficulties for networked application users. Many software applications restrict other users' ability to use shared network resources, such as data files, while a resources is in use, usually to prevent conflicting manipulation of the resource. For example, documents can be “checked out” while being edited by a user so that another user does not attempt to simultaneously edit the document, or use a stale copy of the document. If a user checks out a document while working from one computer, and then leaves the computer without subsequently “checking it in,” the document can be rendered inaccessible to everyone without intervention by an administrator. And typically, upon such intervention, the changes made to the document are lost.
  • SUMMARY OF THE INVENTION
  • One object of the present invention is to provide computer users flexible access to persistent networked resources to reduce the risk of wasted time and effort that user, hardware, and network unpredictability can create by allowing users to connect to disconnected application sessions and to and to enable efficient and convenient use of networked resources by changing locations and/or computing environments. In some embodiments, there can be multiple applications sessions, and some of the multiple applications sessions can be running on multiple servers.
  • In general, in one aspect, the invention relates to a method for providing remote access to a plurality (e.g., two or more) of application sessions includes receiving authentication information associated with a user. The method also includes identifying a plurality of application sessions already associated with the user in response to the information. The method also includes connecting a client computer operated by the user to the identified plurality of application sessions in response to the received information.
  • In general, in another aspect, the invention relates to an apparatus, such as a server, for providing remote access to an application session. The server includes a network module for receiving authentication information associated with a user that is operating a client computer. The server includes a data store for listing a plurality of application sessions associated with the user. The server also includes a server process for connecting the client computer to the plurality of application sessions enumerated in the data store in response to the received information.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing discussion will be understood more readily from the following detailed description of the invention, when taken in conjunction with the accompanying drawings:
  • FIG. 1 is a schematic diagram depicting a networked client-server computing system.
  • FIG. 2 is a flow chart depicting a method for connecting a client to persistent application session.
  • FIG. 3 is a flow chart depicting a method for pulling persistent application sessions.
  • FIG. 4 is a schematic diagram depicting a networked client-server farm computing system.
  • DETAILED DESCRIPTION
  • Referring to FIG. 1, a client-server computer system 100 includes a first client computer 102 a, a second client computer 102 b, and a server 106. The depiction of two client computers is for illustrative purposes only. The client-server computer system can include any number of client computers. The term computer can refer to a workstation, desktop computer, laptop, handheld computer, or any other form of computing or telecommunications device that is capable of communication and that has sufficient processor power, memory capacity, and human interface capabilities to perform the operations described herein (e.g, a mobile phone or personal digital assistant).
  • In one embodiment, the first client computer 102 a includes an input module 108, a client process 110, a network module 112, and a display module 114. The input module 108 provides an interface for a user of the first client computer 102 a to interact with the first client computer 102 a, for example to request the remote execution of an application 116 in an application session 118 from the server 106.
  • An application session 118 is a process, operating on the server 106, that supports the execution of one or more applications 116. An application 116 can be a software program, for example, or any organized set of software code capable of being executed by a computer, or hardwired into circuitry in the form of an Application Specific Integrated Circuit (ASIC), read only memory (ROM) microchip, and the like. Example applications include, but are not limited to Microsoft Word (available from Microsoft Corporation Redmond, Wash.), Internet Explorer (Microsoft), Acrobat (available from Adobe Systems, Inc. San Jose, Calif.), etc. In one embodiment, an application session 118 includes a desktop application 116 from which the execution of other applications 116 can be initiated. Application sessions 118 can be nested within other application sessions 118. In another embodiment, the application session 118 includes an instance of the execution of a single application 116.
  • The execution of applications 116 in application sessions 118 on a remote server 106 allows computer users and administrators to take advantage of centralized computing power and software consistency. While the capabilities of computing devices have rapidly been increasing, the amount of computing resources needed to efficiently operate computer software, the desire for mobile computing, and the use of smaller, less capable computing devices also continues to increase. For example, users increasingly desire the ability to access computationally intensive applications from handheld computing devices such as personal digital assistants (PDAs), and even mobile telephones. In addition an enterprise computing setting, administrators often want to ensure that all users utilize the same version of a software program, regardless of where the users are working. Moreover, some applications require close proximity to other resources (e.g., network disks, printers, communications links).
  • For these reasons and others, computer users and administrators are increasingly turning to using remotely executing software applications to address some of these concerns. For example, a low-resource, minimally functional computing device, such as a Personal Digital Assistant (PDA) can connect to a remote server, initiate an application session, launch a computationally intensive application, and interact with the application through the PDA, by having the computationally intensive application execute using the resources of the server. As long as the PDA has sufficient display and input capabilities, remote access can greatly decrease the computational limitations of the device. In another example, an employee can access from his or her home computer an application that ordinarily is only available through the employee's desktop computer by connecting to a remote server. As with the previous example, the execution of the application occurs on the remote server through an application session. The remote access to the application relieves the employee of the need to install the application on his or her home computer. It also satisfies the desire of the system administrator of the employee's company to ensure employees use the same version of an application from whichever computer they may want to use it.
  • In one embodiment, the input module 108 is, for example, a graphical user interface that provides one or more icons or menu selections for a user to select. Each icon or menu selection represents a specific application 116 available for remote execution. Selecting an icon or menu selection initiates the transmittal of a log-on request to the server 106 for access to that application 116. In another embodiment, an icon or menu selection does not represent any specific application 116, but instead represents a general server 106 log-on procedure. In another embodiment, the input module 108 is non-graphical user interface. In this embodiment, the user can enter a command to send a log-on request to server 106. Entering a command can include typing a predefined set of characters or depressing a specified key sequence on an input device (e.g., a keyboard or keypad). The log-on request at least includes user-provided authentication information. The input module 108 accepts the input of the user-provided authentication information, which can include any type of authentication information, including without limitation any of user name-password/PIN combinations, voice samples, one-time passcodes, biometric data, digital certificates, smart card data, etc. In some embodiments, the input module 108 is in communication with additional hardware peripherals (not shown) to facilitate acceptance of user authentication information. In other embodiments, the input module 108 can accept authentication information outside of the log-on process.
  • The input module 108 accepts authentication information and provides it to the client process 110. The client process 110 then manages the client side functionality of the remotely executing application session. The client process 110 forwards user input including the authentication information and requests for termination or disconnection of application sessions 118 to the server 106. The client process 110 also handles data incoming from the server 106, for example, by forwarding the graphical output of an application session 118 to the display module 114.
  • The network module 112 provides for communication between the first client computer 102 a and the server 106. The network module sends user input, such as authentication information and requests for access to, disconnection from, or termination of application sessions 118 executing on the server 106. The network module also receives output from the application sessions 118 and forwards the output to the client process 110. In one embodiment, the network module 112 encapsulates user input into, and reconstitutes application session output from, a predetermined protocol for transmission to the server 106. In another embodiment, the network module encrypts outgoing transmissions and decrypts incoming transmissions.
  • The display module 114 displays the output of an application 116 from a remotely-executing application session 118. In one embodiment, the display module 114 forwards output video data received from the client process 110 directly to a display, such as a cathode ray tube (CRT) display, liquid crystal display (LCD) screen, plasma display, projector, or other suitable form of display device. In another embodiment, the application output is encrypted, encapsulated in a protocol, or both. In this embodiment, the display module 114 first manipulates the application output so that the output can be interpreted by a standard display adapter such as a computer video card. In another embodiment, the display module 114 includes the standard display adapter.
  • In one embodiment, the server 106 is a single computer that has sufficient processing capability to perform the tasks described here. Preferably the server is a server-class computer running a multiprocessing operating system, such as Windows XP Professional, Mac OS X Server (available from Apple Computer, Inc., Cupertino, Calif.), Unix-based operating systems (e.g., Solaris, Sun Microsystems, Sunnyvale, Calif.), or other suitable operating system. In another embodiment, the server 106 includes multiple connected computers. In a further embodiment, the multiple computers of the server 106 are configured as a “server farm.” In general, a server farm is a group of servers that are linked together to appear to users and/or administrators as a single server system and typically have centralized administration. One illustrative server farm configuration is described in greater detail in United States Patent Application Publication No. 2001/0049717 A1, published on Dec. 6, 2001 and entitled “A Method and Apparatus for Communication Among a Network of Servers.” Of course, it will be apparent that there are many configurations of server farms that would also be useful for embodiments of the invention. In one embodiment, the server 106 includes a network module 120, a server process 122, an application output transmitter 124, and a data store 126, a rules source 128, and an authentication module 130.
  • The network module 120 provides communication functionality for the server 106. For example, the network module 120 receives communications from first and second client computers 102 a and 102 b over one or more data networks or links 121. The network module 120 also transmits application output data to the first and second client computers 102 a and 102 b. In one embodiment, the network module 120 encrypts outgoing communications and decrypts incoming communications. Likewise, in one embodiment, the network module 120 encapsulates outgoing communications in a protocol for transmission and retrieves incoming data from transmissions received according to a protocol. Protocols can include, for example and without limitation, HTTP, Independent Computing Architecture (ICA) protocol (used by Citrix, Systems, Inc. Ft. Lauderdale, Fla.), Remote Desktop Protocol (RDP) (Microsoft Corporation), or Common Gateway Protocol (CGP) (Citrix). The network module 120 of the server 106 communicates with the network module 112 of the first client computer 102 a over a network 121. The network 121 can be implemented with any of a variety of suitable technologies, for example, over standard telephone lines, LAN or WAN links (using, e.g., 802.11, T1, T3, 56 kb, or X.25 protocols), broadband connections (using, e.g., ISDN, Frame Relay, or ATM protocols), and wireless connections, or some combination of any or all of the above. Incoming communications, once decrypted or retrieved from a protocol (if necessary), are forwarded to an application session 118 or to the server process 122, as appropriate.
  • The server process 122 manages the execution and termination of application sessions 118 and the connections and disconnections of those application sessions 118 to the first and second client computers 102 a and 102 b. The server process 122 can initiate new application sessions 118, disconnect a client computer 102 a or 102 b from an application session 118, detect a client computer 102 a or 102 b disconnection from an application session 118, locate an application session 118 from which a user has disconnected, locate an application to which a user of the first client computer 102 a is connected to from the second client computer 102 b, and connect a user to a disconnected application session 118. Preferably, the application sessions 118 are provided so as to be configured with the user's personal preferences and access allowances.
  • The application output transmitter 124 transmits output from an application session 118 to a client computer 102 a or 102 b through the network module 120. The application output transmitter 124 intercepts the output of an application session 118 and determines which client computer 102 a or 102 b is connected to the application session 118. If the application session 118 is connected to a client station, the application output transmitter 124 transmits the application output data to the connected client computer 102 a or 102 b via the network module 120. In one embodiment, if the application session is not connected to a client computer 102 a or 102 b, the application output transmitter 124 discards the application output data and waits to receive future application output data. In another embodiment, if the application sessions 118 is not connected to a client computer 102 a or 102 b, the application output transmitter 124 disregards all further application output data until the application output transmitter 124 receives notification that the application session 118 has connected to a client computer 102 a or 102 b. In another embodiment, the application output transmitter 124 stores the data until the application output transmitter 124 receives notification that the application session 118 has connected to a client computer 102 a or 102 b. In another embodiment, the application output transmitter 124 attempts to send application output data to a client computer 102 a or 102 b until the server process 122 notifies the application output transmitter 124 that the client computer 102 a or 102 b is disconnected from the server 106. In one embodiment, the application output transmitter 124 determines which client computer 102 a or 102 b, if any, the application session 118 is connected to by consulting the data store 126.
  • The data store 126 includes information related to application sessions initiated by users. The data store can be stored in volatile or non-volatile memory or, for example, distributed through multiple servers. Table 1 shows the data included in a portion of an illustrative data store 126.
    TABLE 1
    Application Session App Session 1 App Session 2 App Session 3
    User ID User 1 User 2 User 1
    Client ID First Client First Client
    Client Address 172.16.0.50 172.16.0.50
    Status Active Disconnected Active
    Applications Word Processor Data Base Spreadsheet
    Process Number 1 3 2
    Server Server A Server A Server B
    Server Address 172.16.2.55 172.16.2.55 172.16.2.56
  • The illustrative data store 126 in Table 1 includes data associating each application session 118 with the user that initiated the application session 118, an identification of the client computer 102 a or 102 b, if any, from which the user is currently connected to the server 106, and the IP address of that client computer 102 a or 102 b. The illustrative data store 126 also includes the status of each application session. An application session 118 status can be, for example, “active” (meaning a user is connected to the application session 118), or “disconnected” (meaning a user is not connected to the application session). In an alternative embodiment, an application session status can also be set to “executing-disconnected” (meaning the user has disconnected from the application session 118, but the applications in the application session 118 are still executing), or “stalled-disconnected” (meaning the user is disconnected and the applications 116 in the application session 118 are not executing, but their operational state immediately prior to the disconnection has been stored). The data store 126 further stores information indicating the applications 116 that are executing within each application session 118 and data indicating each application's 116 process on the server. In embodiments in which the server 106 is a server farm, the data store 126 is at least a part of the dynamic store, and also includes the data in the last two rows of Table 1 that indicate on which server in the server farm each application 116 is/was executing, and the IP address of that server. In alternative embodiments, the data store 126 includes a status indicator for each application 116 in each application session 118.
  • For example, in the example of Table 1, three application sessions 118 exist, App Session 1, App Session 2, and App Session 3. App Session 1 is associated with User 1, who is currently using terminal 1. Terminal one's IP address is 172.16.2.50. The status of App Session 1 is active, and in App Session 1, a word processing program, is being executed. The word processing program is executing on Server A as process number 1. Server A's IP address is 172.16.2.55. App Session 2 in Table 1 is an example of a disconnected application session 118. App Session 2 is associated with User 2, but App Session 2 is not connected to a client computer 102 a or 102 b. App Session 2 includes a database program that is executing on Server A, at IP address 172.16.2.55 as process number 3. App Session 3 is an example of how a user can interact with application sessions 118 operating on different servers 106. App Session 3 is associated with User 1, as is App Session 1. App Session 3 includes a spreadsheet program that is executing on Server B at IP address 172.16.2.56 as process number 2, whereas the application session 118 included in App Session 1 is executing on Server A.
  • In one embodiment, server 106 also includes a rules source 128. The rules source 128 stores rules governing the reaction of the server process 122 to a user transmitting authentication information to the server 106. In one embodiment, the rules stored in the rules source 128 are specified at least in part by the system administrator. In another embodiment, a user specifies at least some of the rules stored in the rules source 128. The user-specified rule(s) are stored as preferences. The rules source 128 can be stored in volatile or non-volatile memory or, for example, distributed through multiple servers.
  • One rule stored in the rule source 128, for example, might require or forbid automatic connection to disconnected application sessions 118. Another rule might require or forbid automatic connection to active application sessions 118 currently connected to a different client computer 102 a or 102 b. Yet another rule might make connection and/or connection contingent on the client computer 102 a or 102 b that requests access being within a secure network. A further rule might only allow connection to application sessions 118 after receiving user approval. Another rule might only allow connection for a predetermined time after disconnection. Still another rule only allows connection to application sessions 118 that include specific applications 116.
  • The authentication module 130 is responsible for authenticating a user that attempts to log on to the server 106. The authentication module 130 receives user-provided authentication information transmitted from the first client computer 102 a. The authentication module 130 then authenticates the user based on the user-provided authentication information. In response to a successful authentication, the authentication module 130 transmits the results of the authentication process (e.g., allow or deny access, the user's system ID, client computer ID, user access permissions, etc.) to the server process 122.
  • In one embodiment, the above-described modules and processes of the server 106 (i.e., the network module 120, the server process 122, the application output transmitter 124, and the authentication module 130) and a client computer 102 a or 102 b (i.e. the input module 108, the client process 110, the network module 112 and the display module 114) are all implemented in software executable on one of several computer operating systems, including without limitation the Windows family of operating systems (Microsoft Corporation), the MacOS family of operating systems (Apple Computer, Inc., Cupertino, Calif.), and Unix based operating systems (e.g., Solaris, Sun Microsystems, Sunnyvale, Calif.). In other embodiments, one or more modules or processes are implemented in hardware as application specific integrated circuits (ASICs), Read Only Memory (ROM) devices, or other digital hardware circuitry.
  • Unintentional termination of application sessions 118 resulting from imperfect network connections and users' failure to terminate their application sessions 118 themselves can lead to user difficulties. One embodiment of the invention limits these difficulties by differentiating disconnection (which is treated as if the user is not done working with an application session 118) from termination (which is assumed to be an intentional end to the application session) and by correlating application sessions 118 with users as opposed to client computers. When a user is finished using an application 116 operating in an application session 118, the user can terminate an application session 118. Termination generally involves the affirmative input of the user indicating that the server should no longer maintain the application session 118. Such affirmative user input can include selecting an “Exit” option from a menu, clicking on an icon, etc. In response to the server process 122 receiving a termination request, the execution of the application session 118 and any application 116 within that application session 118 is halted. In one embodiment, data related to the application session 118 is also removed from the data store 126.
  • Disconnection, either intentional or unintentional, on the other hand, does not result in termination of application sessions 118. Since the application or applications operating in an application session 118 are executing on the server 106, a connection to the first client computer 102 a is not usually necessary to continue execution of the applications 116, and in one embodiment the applications 116 can continue to execute while waiting for the user to connect. In an alternative embodiment, upon disconnection of a user, the server process 122 stalls the execution of the applications 116 operating in the application session 118. That is, the server process 122 halts further execution of the applications 116, and the server process 122 stores the operational state of the application 116 and any data the application 116 is processing. In a further embodiment, the server process 122 can selectively stall execution of specific applications 116 after a user disconnects. For example, in one embodiment, the server continues execution of an application 116 for a fixed time period, and if a user fails to connect within that time period, the server process 122 stalls the application 116. In another embodiment, the server stalls specified application sessions 118 that cannot continue executing without user input. In each of the above-described embodiments, if the user of the first client computer 102 a disconnects from the server 106 and then connects to the server 106 while operating the first client computer 102 a, the second client computer 102 b, or a third client computer, the server process 122 can connect the client computer operated by the user to one or more previously initiated, non-terminated application session(s) 118 associated with the user, and reinitiate execution of any stalled applications 116.
  • In one embodiment, the server process 122 detects a disconnection. A user can intentionally and manually instruct the server to disconnect an application session 118 from the client computer 102 a or 102 b that the user is communicating from. For example, in one embodiment, application sessions 118 provide a menu option for disconnection (as distinguished from termination above) that a user can select. The server process 122 can also detect an unintentional disconnection. For example, in one embodiment, the network module 120 of the server 106 informs the server process 122 when a predetermined number of data packets transmitted by the network module 120 to a client computer 102 a or 102 b have not been acknowledged by the client computer 102 a or 102 b. In another embodiment, the client computer 102 a or 102 b periodically transmits a signal to the server 106 to confirm that a connection is still intact. If the server process 122 detects that a predetermined number of expected confirmation signals from a client computer 102 a or 102 b have not arrived, the server process 122 determines that the client computer 102 a or 102 b has disconnected. If the server process 122 detects that a user has disconnected from an application session 118, either intentionally, or unintentionally, the entry in the data store 126 related to the disconnected application session 118 is modified to reflect the disconnection.
  • Referring also to FIG. 2, a method 200 of providing remote access to an application session, in one embodiment, begins with the network module 120 of the server 106 receiving authentication information associated with a user (step 202). Authentication information can include a number of types of authentication information, including without limitation user names, client names, client addresses, passwords, PINs, voice samples, one-time passcodes, biometric data, digital certificates, tickets, etc. and combinations thereof. The authentication information could be in the form of a log-on request from a user. As described above, a log-on request can be initiated by a user through the input module 108 of a client computer 102 a or 102 b. The client's network module forwards the request to the server process 122.
  • In one embodiment, upon receiving the request, the server process 122 forwards the user-provided authentication information to the authentication module 130, which authenticates the identity of the user. The server's authentication module 130 can perform the authentication itself and/or in cooperation with one or other modules or computers, such as a domain server, an authentication service, etc. Successful authentication results in the authentication module transmitting identification information for the user (e.g., a username or ID) to the server process 122.
  • In response to receiving authentication information associated with the user the server process 122 identifies any disconnected application sessions 118 associated with the user that are executing or stalled on the server 106 (step 204). In one embodiment, the server process 122 identifies the application sessions 118 upon receiving the authentication information. In another embodiment, the server process identifies the applications in response to receiving the authentication information after the authentication module 130 verifies of the user's identity. In one embodiment, server process 122 determines whether any such disconnected application sessions 118 exist by consulting the data store 126 for sessions related to the user. For example, the disconnected application session 118 could have been disconnected by direction of the user of the application session 118, resulting in the server process 122 disconnecting the application session 118, for example, by modifying the status of application session 118 in the data store 126 to “disconnected,” and deleting the identification of the connected client computer 102 a or 102 b in the data store 126 entry for the application session 118. In another embodiment, the disconnection was unintentional. Unintentional disconnection results in the server process 122 making the same modifications to the data store 126 as would be made as a result of an intentional disconnection.
  • Upon identifying any disconnected application sessions 118 (step 204), in one embodiment, the server process 122 prompts the user to indicate whether connection is desired. If connection is not desired, the server process 122 prompts to user to indicate whether the disconnected applications sessions 118 should remain disconnected, or whether the application sessions 118 should be terminated. In an alternative embodiment, the server process 122 consults a rule stored in the rules source 128 to determine whether connection and/or connection is permitted and/or required.
  • In an alternative embodiment, the user connects to the server 106, the server process 122, and any disconnected application sessions by utilizing a single user interface element, for example clicking an icon labeled “Log-on.” In this embodiment, activating the single user interface will automatically connect the user to any disconnected applications sessions 118.
  • In one embodiment, the client can be configured to automatically send authentication information upon such user connection. If connection is permitted, and is either assented to by user or is automatic, the server process 122 connects the user to the disconnected application sessions (step 206). In one embodiment, connection includes modifying the entry in the data store 126 to indicate that the user is connected to the application session 118 and to indicate from which client computer 102 a or 102 b the user is connected to the server. Upon connection, the server 106 resumes transmitting application output data from the application output transmitter 124 to the client 102 a or 102 b. In another embodiment, the application output transmitter consults the rules source 128 before beginning transmitting application output to ensure such transmission is permitted.
  • Application sessions are associated primarily with users instead of the client computer 102 a or 102 b which the user was operating when the user previously had connected to, (and then been disconnected from) the server. As a result, rules permitting, the user can reconnect to an application session 118 from the first client computer 102 a, the second client computer 102 b, or any other client computer.
  • Referring to FIG. 3, even if a session is not disconnected (i.e., is active) it can be useful to transfer the session from one client to another. For example, it may be that an application session was disconnected, but the server did not yet detect the disconnection. It may be that the user deliberately left a session running, but would now like to access the session from another location.
  • A method 300 for transferring active application sessions 118 from a first client computer 102 a to a second client computer 102 b typically begins with the network module 120 receiving authentication information from a user, for example in the form of a log-on request. In one embodiment, the user submits the authentication information via the input module 108. The authentication information can be transmitted by the network module 112 of second client computer 102 b to the server 106. The network module 120 of the server 106 can forward the request to the server process 122.
  • The server process 122 receives the user-provided authentication information (step 302). In one embodiment, the server process 122 forwards the user-provided authentication information to an authentication module 130, which authenticates the identity of the user using, for example, any of the variety of authentication techniques described above. Successful authentication results in the authentication module transmitting for example, identification information for the user to the server process 122.
  • After receiving authentication information (step 302), the server process consults the data store 126 to identify any active application sessions 118 that are associated with the user, but that are connected to a different client computer, such as the first client computer 102 a as an illustrative example (step 304). In one embodiment, if the server process 122 identifies any such active application sessions 118, the server process automatically disconnects the application session(s) 118 from the first client computer 102 a (step 306) and connects the application session(s) 118 to the current client computer 102 b (step 308). In one embodiment, the user can trigger the automatic consultation of the data store and subsequent connection with the selection of a single user interface element.
  • In an alternative embodiment, the server process 122 prompts the user as to whether the user wants to have the active application session(s) 118 connected to the current client computer 102 b. If the user declines to transfer one or more of the active application session(s), the server process 122 prompts the user to either keep the application session(s) 118 active, or to terminate the application session(s) 118. In an alternative embodiment, the server process 122 consults a rule stored in the rules source 128 to determine whether transfer of the active application session(s) 118 are permitted before transferring the active application session(s) 118.
  • If transfer of the application session(s) 118 are permitted and transfer is automatic or requested by the user, in one embodiment the server process 122 carries out the disconnection (step 306) and connection (step 308) by modifying the entry maintained in the data store 126 for the application session 118 to substitute the identity of the stored client computer 102 a with the identity of the current client computer, i.e. the second computer 102 b. Upon connection to the current client computer 102 b, the application output transmitter 124 begins transmitting application output to the current computer (step 310). In another embodiment, the application output transmitter consults the rules source 128 before beginning transmitting application output to ensure such transmission is permitted.
  • It should be understood that the methods of FIG. 2 and FIG. 3 can be combined to allow a client to be connected to both disconnected and active sessions associated with a user. In addition, prior to transfer or reconnection, the active and/or disconnected sessions could have been connected to the same or several different client computers.
  • Referring to FIG. 4, as mentioned above, the server 106 can be implemented as a server farm 400. In one embodiment, the server farm includes several servers 406 a, 406 b, and 406 c, which are linked together and which are jointly administered. Several client computers 402 a, 402 b, and 402 c (typically many computers) can connect to the server farm 400 over a network 421. The servers 406 a, 406 b, and 406 c share the computational load put on the server farm 400. For example, if a user is accessing three application sessions 418 a, 418 b, and 418 c, each application session can be executing on a different server 406 a, 406 b, or 406 c. Similarly, if the user is accessing two or more applications 116 through a single application session 418 a, 418 b or 418 c, the server process 122 of the server farm 400 can assign one application to execute on one server 406 a and another application to execute on server 406 b. In a server farm configuration, the modules of the server 120, 122, and 124, the data store 126, and the rules source 128 (FIG. 1), can be stored on a single server 406 a, 406 b or 406 c, or can be distributed among the servers 406 a, 406 b, and 406 c.
  • With respect to connecting to the server farm 400 after a disconnection or after changing client computers 402 a, 402 b and 402 c without disconnecting, the server process 122 treats the servers 406 a, 406 b, and 406 c as a single server. That is, if a server farm is executing a user's application sessions 418 a, 418 b, and 418 c on separate servers 406 a, 406 b, and 406 c, and the user disconnects from the server farm 400 or changes the client computer 402 a, 402 b, or 402 c at which the user is working, upon subsequently connecting to the server farm 400, the server process 122 of the server farm 400 can automatically connect the user's client computer 402 a, 402 b, or 402 c with all three application sessions 418 a, 418 b, and 418 c executing on all three severs 406 a, 406 b, and 406 c.
  • In an illustrative example operation of one embodiment of the of the system, a user of a first client computer 402 a, which in this example is a mobile handheld computer, logs on to the server farm 400 via a wireless modem and requests two application sessions 418 a and 418 b. The server process 122 of the server farm 400 launches a first application session 418 a on a first server 406 a and a second application session on a second server 406 b. The wireless modem loses its connection with the server farm when the user of the first computer 402 a enters an elevator. The server process 122 of the server farm 400 determines that the user is disconnected, and the server process 122 updates the data store 126 accordingly.
  • The user then logs on to the server farm 400 from a second client computer 402 b, which in this example is a desktop computer in his office. The server process 122 consults the data store 126 and determines that two disconnected application sessions 418 a and 418 b are associated with the user. The server process 122 (assuming no rules to the contrary) automatically connects the second client computer 402 b to both application sessions 418 a and 418 b executing on servers 406 a and 406 b, respectively.
  • The user then leaves the second client computer 402 b without disconnecting from the server farm 400 and logs on to the server farm 400 from a third client computer 402 c, for example a colleague's laptop. Upon logging on from the third client computer 402 c, the server process consults the data store 126 and determines that the user is associated with the two active application sessions 418 a and 418 b connected to the second client computer 402 b. The server process 122 (assuming no rules to the contrary) then automatically disconnects both of the application sessions 418 a and 418 b from the second client computer 402 b, and connects both of the application sessions 418 a and 418 b to the third client computer 402 c.
  • The user next selects a disconnect option for each application session 418 a and 418 b. The server process 122 updates the data store 126 to indicate that the application sessions 418 a and 418 b have been disconnected. The user then logs on to the server farm 400 from the second client computer 402 b. The server process 122 consults the data store 126 and determines that two disconnected application sessions 418 a and 418 b are associated with the user. The server process 122 (assuming no rules to the contrary) automatically connects the disconnected application sessions 418 a and 418 b to the second client computer 402 b.
  • One skilled in the art will realize the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The foregoing embodiments are therefore to be considered in all respects illustrative rather than limiting of the invention. The scope of the invention is not limited to just the foregoing description.

Claims (43)

  1. 1. A method for providing remote access to a plurality of application sessions, the method comprising:
    receiving authentication information associated with a user;
    identifying a plurality of application sessions already associated with the user in response to the information; and
    establishing a connection between a client computer operated by the user and the plurality of application sessions in response to the received information.
  2. 2. The method of claim 1 wherein a first one of the application sessions is running on a first server and a second one of the application sessions is running on a second server.
  3. 3. The method of claim 1 wherein the step of establishing a connection between the client and the plurality of application sessions is subject to a rule permitting the client computer operated by the user to connect to the plurality of application sessions.
  4. 4. The method of claim 3 wherein the rule is created by the user.
  5. 5. The method of claim 3 wherein the rule is created by an administrator.
  6. 6. The method of claim 1 wherein the connection between the user and the plurality of application sessions is triggered by the selection of a single user interface element.
  7. 7. The method of claim 1 further comprising:
    receiving a disconnect request to disconnect the first application session associated with the user and the second application session associated with the user; and
    disconnecting the first and second application sessions.
  8. 8. The method of claim 7 further comprising updating at least one data record associated with the first and second application sessions to indicate that the first and second application sessions are disconnected.
  9. 9. The method of claim 8 further comprising the step of continuing execution of at least one of the disconnected application sessions.
  10. 10. The method of claim 1 further comprising authenticating the user in response to the received authentication information.
  11. 11. The method of claim 1 wherein the step of identifying the plurality of application sessions comprises consulting stored data associated with a plurality of servers executing application sessions.
  12. 12. The method of claim 1 wherein the plurality of application sessions was connected to a first client computer prior to connection and, after connection, the plurality of application sessions is reconnected to the first client computer.
  13. 13. The method of claim 1 wherein the plurality of application sessions was associated with a first client computer prior to establishing the connection and, after establishing the connection, the plurality of application sessions is connected to a second client computer.
  14. 14. The method of claim 1 wherein at least one of the plurality of application sessions is disconnected.
  15. 15. The method of claim 1 wherein at least one of the plurality of application sessions is active.
  16. 16. The method of claim 1 wherein the identifying a plurality of applications sessions is automatic upon receipt of authentication information.
  17. 17. A method for providing remote access to a plurality of application sessions, the method comprising:
    transmitting authentication information associated with a user; and
    receiving application output from a plurality of previously disconnected application sessions associated with the user in response to the transmitted information.
  18. 18. The method of claim 17 wherein the receiving application output is automatic upon the transmission of authentication information.
  19. 19. The method of claim 17 further comprising:
    disconnecting at least one active application session associated with the user in response to the transmitted information.
  20. 20. The method of claim 19 wherein the disconnecting is automatic upon the transmission of authentication information.
  21. 21. The method of claim 17 wherein the plurality of active application sessions is initially connected to a first client computer and, upon transmitting the information, the user is operating a second client computer.
  22. 22. The method of claim 17 wherein the receipt of application output from the plurality of active application sessions is subject to a rule permitting the user to have a client computer operated by the user connect to the plurality of active application sessions.
  23. 23. The method of claim 22 wherein the rule is created by the user.
  24. 24. The method of claim 22 wherein the rule is created by an administrator.
  25. 25. The method of claim 17 wherein the receipt of application output from the plurality of active application sessions and the receipt of application output from the plurality of disconnected application sessions are triggered by the selection of a single user interface element.
  26. 26. The method of claim 17 further comprising transmitting a disconnect request to disconnect at least one active application session associated with the user.
  27. 27. The method of claim 17 wherein the plurality of disconnected application sessions was connected to a first client computer prior to disconnection and, at connection, the plurality of disconnected application session is reconnected to the first client computer.
  28. 28. The method of claim 17 wherein the plurality of disconnected application sessions was connected to a first client computer prior to disconnection and, at connection, the plurality of disconnected application session is connected to a second client computer.
  29. 29. A server for providing remote access to an application session, the server comprising:
    a network module for receiving authentication information associated with a user operating a client computer;
    a data store for enumerating a plurality of application sessions associated with the user;
    a server process for connecting the client computer to the plurality of application sessions enumerated in the data store in response to the received information.
  30. 30. The server of claim 29 wherein a first one of the application sessions is running on a first server and a second one of the application sessions is running on a second server.
  31. 31. The server of claim 29 wherein the server process connects the client to the plurality of application sessions subject to a rule permitting the client computer operated by the user to connect to the plurality of application sessions.
  32. 32. The server of claim 31 wherein the rule is created by the user.
  33. 33. The server of claim 31 wherein the rule is created by an administrator.
  34. 34. The server of claim 29 wherein the connection of the user to the plurality of application sessions is triggered by the selection of a single user interface element.
  35. 35. The server of claim 29 wherein the server process is also configured to receive a disconnect request to disconnect the first application session associated with the user and the second application session associated with the user and disconnect the first and second application sessions in response to the request.
  36. 36. The server of claim 35 wherein the server process is further configured to update at least one data record associated with each of the first and second application sessions to indicate that the first and second application sessions are disconnected.
  37. 37. The server of claim 35 wherein the server process is further configured to continuing execution of at least one of the disconnected application sessions.
  38. 38. The server of claim 29 further comprising an authentication module for authenticating the user in response to the received authentication information.
  39. 39. The server of claim 29 wherein the data store comprises stored data associated with a plurality of servers executing application sessions.
  40. 40. The server of claim 29 wherein the plurality of application sessions was connected to a first client computer prior to connection and, after connection, the plurality of application sessions is reconnected to the first client computer.
  41. 41. The server of claim 29 wherein the plurality of application sessions was associated with a first client computer prior to connection and, after connection, the plurality of application sessions is connected to a second client computer.
  42. 42. The server of claim 29 wherein at least one of the plurality of application sessions is disconnected.
  43. 43. The server of claim 29 wherein at least one of the plurality of application sessions is active.
US10683548 2003-10-10 2003-10-10 Methods and apparatus for providing access to persistent application sessions Active 2025-10-31 US7594018B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10683548 US7594018B2 (en) 2003-10-10 2003-10-10 Methods and apparatus for providing access to persistent application sessions

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US10683548 US7594018B2 (en) 2003-10-10 2003-10-10 Methods and apparatus for providing access to persistent application sessions
PCT/US2004/029684 WO2005038649A3 (en) 2003-10-10 2004-09-10 Methods and apparatus for providing access to persistent application sessions
CA 2541987 CA2541987A1 (en) 2003-10-10 2004-09-10 Methods and apparatus for providing access to persistent application sessions
EP20040783774 EP1671226A2 (en) 2003-10-10 2004-09-10 Methods and apparatus for providing access to persistent application sessions
KR20067006892A KR20060131739A (en) 2003-10-10 2004-09-10 Method and apparatus for providing access to persistent application sessions
EP20080009196 EP2000905A1 (en) 2003-10-10 2004-09-10 Methods and apparatus for providing access to persistant application sessions
JP2006533906A JP2007508617A (en) 2003-10-10 2004-09-10 Method of providing access to persistent application sessions and devices
US12563275 US8078689B2 (en) 2003-10-10 2009-09-21 Methods and apparatus for providing access to persistent application sessions

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12563275 Continuation US8078689B2 (en) 2003-10-10 2009-09-21 Methods and apparatus for providing access to persistent application sessions

Publications (2)

Publication Number Publication Date
US20050080906A1 true true US20050080906A1 (en) 2005-04-14
US7594018B2 US7594018B2 (en) 2009-09-22

Family

ID=34422758

Family Applications (2)

Application Number Title Priority Date Filing Date
US10683548 Active 2025-10-31 US7594018B2 (en) 2003-10-10 2003-10-10 Methods and apparatus for providing access to persistent application sessions
US12563275 Active 2023-11-14 US8078689B2 (en) 2003-10-10 2009-09-21 Methods and apparatus for providing access to persistent application sessions

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12563275 Active 2023-11-14 US8078689B2 (en) 2003-10-10 2009-09-21 Methods and apparatus for providing access to persistent application sessions

Country Status (6)

Country Link
US (2) US7594018B2 (en)
EP (2) EP1671226A2 (en)
JP (1) JP2007508617A (en)
KR (1) KR20060131739A (en)
CA (1) CA2541987A1 (en)
WO (1) WO2005038649A3 (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050267779A1 (en) * 2004-05-31 2005-12-01 Samsung Electronics Co., Ltd. Method, apparatus, and medium for servicing clients in remote areas
US20060069662A1 (en) * 2004-09-30 2006-03-30 Citrix Systems, Inc. Method and apparatus for remapping accesses to virtual system resources
US20060085789A1 (en) * 2004-09-30 2006-04-20 Laborczfalvi Lee G Method and apparatus for moving processes between isolation environments
US20060090171A1 (en) * 2004-09-30 2006-04-27 Citrix Systems, Inc. Method and apparatus for virtualizing window information
US20060230059A1 (en) * 2005-03-30 2006-10-12 International Business Machines Corporation Method and apparatus to select and deliver portable portlets
US20070067321A1 (en) * 2005-09-19 2007-03-22 Bissett Nicholas A Method and system for locating and accessing resources
US20070083522A1 (en) * 2005-10-07 2007-04-12 Nord Joseph H Method and a system for responding locally to requests for file metadata associated with files stored remotely
US20070083655A1 (en) * 2005-10-07 2007-04-12 Pedersen Bradley J Methods for selecting between a predetermined number of execution methods for an application program
US20070216935A1 (en) * 2006-03-17 2007-09-20 Fuji Xerox Co., Ltd. Image forming apparatus, printing system, job execution system, and job execution method
US20080244718A1 (en) * 2007-03-30 2008-10-02 Simon Frost Systems and Methods for User Login
US20080320145A1 (en) * 2007-06-22 2008-12-25 Juan Rivera Methods and Servers for Displaying and Activating Disconnected Sessions
US20090106780A1 (en) * 2007-10-20 2009-04-23 Nord Joseph Method and system for communicating between isolation environments
US20090254900A1 (en) * 2006-07-13 2009-10-08 Seiko Epson Corporation Network system, computers, and method and program for providing and executing applications in network system
US7752600B2 (en) 2004-09-30 2010-07-06 Citrix Systems, Inc. Method and apparatus for providing file-type associations to multiple applications
US20100281102A1 (en) * 2009-05-02 2010-11-04 Chinta Madhav Methods and systems for launching applications into existing isolation environments
US20110113089A1 (en) * 2009-11-09 2011-05-12 Apple Inc. Delivering media-rich-invitational content on mobile devices
FR2959632A1 (en) * 2010-05-03 2011-11-04 Evidian Logon Method from a machine belonging to a machinery
US8171479B2 (en) 2004-09-30 2012-05-01 Citrix Systems, Inc. Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers
JP2014146294A (en) * 2013-01-30 2014-08-14 Seiko Epson Corp Control system and control method for control system
JP2014146290A (en) * 2013-01-30 2014-08-14 Seiko Epson Corp Control device and control method for control device
US20140254546A1 (en) * 2011-09-29 2014-09-11 Israel L'Heureux Gateway router supporting session hand-off and content sharing among clients of a local area network
US20150365272A1 (en) * 2013-01-30 2015-12-17 Seiko Epson Corporation Control System, Control Method of a Control System, and Control Device
US20160014601A1 (en) * 2014-07-14 2016-01-14 Sony Corporation Enabling secure application distribution on a (e)uicc using short distance communication techniques
US20160034674A1 (en) * 2014-07-29 2016-02-04 Google Inc. Allowing access to applications based on user handling measurements
US20170006021A1 (en) * 2015-06-30 2017-01-05 Vmware, Inc. Providing a single session experience across multiple applications
US9684776B2 (en) 2014-07-29 2017-06-20 Google Inc. Allowing access to applications based on user authentication

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7117239B1 (en) 2000-07-28 2006-10-03 Axeda Corporation Reporting the state of an apparatus to a remote computer
US7185014B1 (en) 2000-09-22 2007-02-27 Axeda Corporation Retrieving data from a server
US8108543B2 (en) 2000-09-22 2012-01-31 Axeda Corporation Retrieving data from a server
US7254601B2 (en) 2001-12-20 2007-08-07 Questra Corporation Method and apparatus for managing intelligent assets in a distributed environment
US7178149B2 (en) 2002-04-17 2007-02-13 Axeda Corporation XML scripting of soap commands
US7966418B2 (en) 2003-02-21 2011-06-21 Axeda Corporation Establishing a virtual tunnel between two computer programs
US7587755B2 (en) * 2004-07-02 2009-09-08 Citrix Systems, Inc. System and method for executing interactive applications with minimal privileges
US20070174429A1 (en) 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
US8370479B2 (en) 2006-10-03 2013-02-05 Axeda Acquisition Corporation System and method for dynamically grouping devices based on present device conditions
US8065397B2 (en) 2006-12-26 2011-11-22 Axeda Acquisition Corporation Managing configurations of distributed devices
US8943182B2 (en) * 2008-10-01 2015-01-27 Motorola Solutions, Inc. Method and system for transferring a communication session
US9338276B2 (en) * 2010-01-26 2016-05-10 Apple Inc. Gating accessory connection
US8429674B2 (en) * 2010-07-20 2013-04-23 Apple Inc. Maintaining data states upon forced exit
US8843616B2 (en) * 2010-09-10 2014-09-23 Intel Corporation Personal cloud computing with session migration
US9027024B2 (en) * 2012-05-09 2015-05-05 Rackspace Us, Inc. Market-based virtual machine allocation
US8843646B2 (en) 2011-09-12 2014-09-23 Microsoft Corporation Multi-desktop interaction using nested remote desktop sessions
US20130238785A1 (en) * 2012-03-06 2013-09-12 Rackspace Us, Inc. System and Method for Metadata Discovery and Metadata-Aware Scheduling
JP5942503B2 (en) * 2012-03-15 2016-06-29 富士通株式会社 Service request apparatus, a service request method and service request program

Citations (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5606668A (en) * 1993-12-15 1997-02-25 Checkpoint Software Technologies Ltd. System for securing inbound and outbound data packet flow in a computer network
US5835726A (en) * 1993-12-15 1998-11-10 Check Point Software Technologies Ltd. System for securing the flow of and selectively modifying packets in a computer network
US5987611A (en) * 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6085247A (en) * 1998-06-08 2000-07-04 Microsoft Corporation Server operating system for supporting multiple client-server sessions and dynamic reconnection of users to previous sessions using different computers
US20010037387A1 (en) * 2000-03-21 2001-11-01 F5 Networks, Inc., Method and system for optimizing a network by independently scaling control segments and data flow
US6321337B1 (en) * 1997-09-09 2001-11-20 Sanctum Ltd. Method and system for protecting operations of trusted internal networks
US20010047406A1 (en) * 2000-04-13 2001-11-29 Netilla Networks Inc. Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities
US20020095584A1 (en) * 2001-01-12 2002-07-18 Royer Barry Lynn System and user interface supporting concurrent application initiation and interoperability
US6452915B1 (en) * 1998-07-10 2002-09-17 Malibu Networks, Inc. IP-flow classification in a wireless point to multi-point (PTMP) transmission system
US20020138618A1 (en) * 2000-03-21 2002-09-26 F5 Networks, Inc. Simplified method for processing multiple connections from the same client
US6463470B1 (en) * 1998-10-26 2002-10-08 Cisco Technology, Inc. Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows
US6466984B1 (en) * 1999-07-02 2002-10-15 Cisco Technology, Inc. Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs
US20020165971A1 (en) * 2001-05-04 2002-11-07 Elad Baron Method and system for terminating an authentication session upon user sign-off
US6496935B1 (en) * 2000-03-02 2002-12-17 Check Point Software Technologies Ltd System, device and method for rapid packet filtering and processing
US20030055962A1 (en) * 2001-07-06 2003-03-20 Freund Gregor P. System providing internet access management with router-based policy enforcement
US20030074580A1 (en) * 2001-03-21 2003-04-17 Knouse Charles W. Access system interface
US20030101343A1 (en) * 2001-11-27 2003-05-29 Eaton Eric Thomas System for providing continuity between messaging clients and method therefor
US6584569B2 (en) * 2000-03-03 2003-06-24 Sanctum Ltd. System for determining web application vulnerabilities
US20030177389A1 (en) * 2002-03-06 2003-09-18 Zone Labs, Inc. System and methodology for security policy arbitration
US6625643B1 (en) * 1998-11-13 2003-09-23 Akamai Technologies, Inc. System and method for resource management on a data network
US20030182431A1 (en) * 1999-06-11 2003-09-25 Emil Sturniolo Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
US20030198189A1 (en) * 2002-04-19 2003-10-23 Dave Roberts Network system having an instructional sequence for performing packet processing and optimizing the packet processing
US6640248B1 (en) * 1998-07-10 2003-10-28 Malibu Networks, Inc. Application-aware, quality of service (QoS) sensitive, media access control (MAC) layer
US20040010621A1 (en) * 2002-07-11 2004-01-15 Afergan Michael M. Method for caching and delivery of compressed content in a content delivery network
US20040107360A1 (en) * 2002-12-02 2004-06-03 Zone Labs, Inc. System and Methodology for Policy Enforcement
US20040111642A1 (en) * 2002-12-05 2004-06-10 Amir Peles Content security by network switch
US6772347B1 (en) * 1999-04-01 2004-08-03 Juniper Networks, Inc. Method, apparatus and computer program product for a network firewall
US20040158429A1 (en) * 2003-02-10 2004-08-12 Bary Emad Abdel Method and system for classifying content and prioritizing web site content issues
US20040162876A1 (en) * 2003-02-14 2004-08-19 Whale Communications Ltd. System and method for providing conditional access to server-based applications from remote access devices
US20040177247A1 (en) * 2003-03-05 2004-09-09 Amir Peles Policy enforcement in dynamic networks
US20040250124A1 (en) * 2003-05-19 2004-12-09 Vsecure Technologies (Us) Inc. Dynamic network protection
US6850943B2 (en) * 2002-10-18 2005-02-01 Check Point Software Technologies, Inc. Security system and methodology for providing indirect access control
US6856651B2 (en) * 2000-07-25 2005-02-15 Peribit Networks, Inc. System and method for incremental and continuous data compression
US20050050362A1 (en) * 2003-08-13 2005-03-03 Amir Peles Content inspection in secure networks
US6873988B2 (en) * 2001-07-06 2005-03-29 Check Point Software Technologies, Inc. System and methods providing anti-virus cooperative enforcement
US20050086206A1 (en) * 2003-10-15 2005-04-21 International Business Machines Corporation System, Method, and service for collaborative focused crawling of documents on a network
US6901075B1 (en) * 1998-03-12 2005-05-31 Whale Communications Ltd. Techniques for protection of data-communication networks
US20050120054A1 (en) * 2003-12-02 2005-06-02 Imperva, Inc Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
US20050132030A1 (en) * 2003-12-10 2005-06-16 Aventail Corporation Network appliance
US20050144481A1 (en) * 2003-12-10 2005-06-30 Chris Hopen End point control
US20050188215A1 (en) * 2004-02-20 2005-08-25 Imperva, Inc. Method and apparatus for high-speed detection and blocking of zero day worm attacks
US20050262063A1 (en) * 2004-04-26 2005-11-24 Watchfire Corporation Method and system for website analysis
US20060029016A1 (en) * 2004-06-29 2006-02-09 Radware Limited Debugging application performance over a network
US7136645B2 (en) * 1998-10-09 2006-11-14 Netmotion Wireless, Inc. Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
US7143437B2 (en) * 2001-01-12 2006-11-28 Siemens Medical Solutions Health Services Corporation System and user interface for managing user access to network compatible applications

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0863419A (en) * 1994-08-17 1996-03-08 Canon Inc Method, device, and system for information processing
JP3608905B2 (en) * 1997-05-29 2005-01-12 三菱電機株式会社 Data communication system and data communication method
US6484174B1 (en) 1998-04-20 2002-11-19 Sun Microsystems, Inc. Method and apparatus for session management and user authentication
EP1364296A4 (en) 2000-09-12 2004-09-15 Netmotion Wireless Inc Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
JP2000207362A (en) * 1999-01-19 2000-07-28 Toshiba Corp Network system and its user authenticating method
JP2001306504A (en) * 2000-04-21 2001-11-02 Casio Comput Co Ltd Computer system, server and terminal equipment
US6785713B1 (en) 2000-05-08 2004-08-31 Citrix Systems, Inc. Method and apparatus for communicating among a network of servers utilizing a transport mechanism
US7565326B2 (en) * 2000-05-25 2009-07-21 Randle William M Dialect independent multi-dimensional integrator using a normalized language platform and secure controlled access
JP4717197B2 (en) * 2000-11-07 2011-07-06 大日本印刷株式会社 Procedure system
JP2002344484A (en) * 2001-05-21 2002-11-29 Nec Commun Syst Ltd Method and system for restoring connection of network
US7526541B2 (en) * 2003-07-29 2009-04-28 Enterasys Networks, Inc. System and method for dynamic network policy management

Patent Citations (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5606668A (en) * 1993-12-15 1997-02-25 Checkpoint Software Technologies Ltd. System for securing inbound and outbound data packet flow in a computer network
US5835726A (en) * 1993-12-15 1998-11-10 Check Point Software Technologies Ltd. System for securing the flow of and selectively modifying packets in a computer network
US5987611A (en) * 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6321337B1 (en) * 1997-09-09 2001-11-20 Sanctum Ltd. Method and system for protecting operations of trusted internal networks
US6901075B1 (en) * 1998-03-12 2005-05-31 Whale Communications Ltd. Techniques for protection of data-communication networks
US6085247A (en) * 1998-06-08 2000-07-04 Microsoft Corporation Server operating system for supporting multiple client-server sessions and dynamic reconnection of users to previous sessions using different computers
US6640248B1 (en) * 1998-07-10 2003-10-28 Malibu Networks, Inc. Application-aware, quality of service (QoS) sensitive, media access control (MAC) layer
US6452915B1 (en) * 1998-07-10 2002-09-17 Malibu Networks, Inc. IP-flow classification in a wireless point to multi-point (PTMP) transmission system
US7136645B2 (en) * 1998-10-09 2006-11-14 Netmotion Wireless, Inc. Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
US6718380B1 (en) * 1998-10-26 2004-04-06 Cisco Technology, Inc. Method and apparatus for storing policies for policy-based management of network quality of service
US6463470B1 (en) * 1998-10-26 2002-10-08 Cisco Technology, Inc. Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows
US6625643B1 (en) * 1998-11-13 2003-09-23 Akamai Technologies, Inc. System and method for resource management on a data network
US6772347B1 (en) * 1999-04-01 2004-08-03 Juniper Networks, Inc. Method, apparatus and computer program product for a network firewall
US20030182431A1 (en) * 1999-06-11 2003-09-25 Emil Sturniolo Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
US6466984B1 (en) * 1999-07-02 2002-10-15 Cisco Technology, Inc. Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs
US6496935B1 (en) * 2000-03-02 2002-12-17 Check Point Software Technologies Ltd System, device and method for rapid packet filtering and processing
US6584569B2 (en) * 2000-03-03 2003-06-24 Sanctum Ltd. System for determining web application vulnerabilities
US20030233581A1 (en) * 2000-03-03 2003-12-18 Eran Reshef System for determining web application vulnerabilities
US20010037387A1 (en) * 2000-03-21 2001-11-01 F5 Networks, Inc., Method and system for optimizing a network by independently scaling control segments and data flow
US20020138618A1 (en) * 2000-03-21 2002-09-26 F5 Networks, Inc. Simplified method for processing multiple connections from the same client
US20010047406A1 (en) * 2000-04-13 2001-11-29 Netilla Networks Inc. Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities
US6920502B2 (en) * 2000-04-13 2005-07-19 Netilla Networks, Inc. Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities
US20020032725A1 (en) * 2000-04-13 2002-03-14 Netilla Networks Inc. Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities
US6856651B2 (en) * 2000-07-25 2005-02-15 Peribit Networks, Inc. System and method for incremental and continuous data compression
US20020095584A1 (en) * 2001-01-12 2002-07-18 Royer Barry Lynn System and user interface supporting concurrent application initiation and interoperability
US7143437B2 (en) * 2001-01-12 2006-11-28 Siemens Medical Solutions Health Services Corporation System and user interface for managing user access to network compatible applications
US20030074580A1 (en) * 2001-03-21 2003-04-17 Knouse Charles W. Access system interface
US20020165971A1 (en) * 2001-05-04 2002-11-07 Elad Baron Method and system for terminating an authentication session upon user sign-off
US20030055962A1 (en) * 2001-07-06 2003-03-20 Freund Gregor P. System providing internet access management with router-based policy enforcement
US6873988B2 (en) * 2001-07-06 2005-03-29 Check Point Software Technologies, Inc. System and methods providing anti-virus cooperative enforcement
US20030101343A1 (en) * 2001-11-27 2003-05-29 Eaton Eric Thomas System for providing continuity between messaging clients and method therefor
US20030177389A1 (en) * 2002-03-06 2003-09-18 Zone Labs, Inc. System and methodology for security policy arbitration
US20030198189A1 (en) * 2002-04-19 2003-10-23 Dave Roberts Network system having an instructional sequence for performing packet processing and optimizing the packet processing
US20040010621A1 (en) * 2002-07-11 2004-01-15 Afergan Michael M. Method for caching and delivery of compressed content in a content delivery network
US6850943B2 (en) * 2002-10-18 2005-02-01 Check Point Software Technologies, Inc. Security system and methodology for providing indirect access control
US20040107360A1 (en) * 2002-12-02 2004-06-03 Zone Labs, Inc. System and Methodology for Policy Enforcement
US20040111642A1 (en) * 2002-12-05 2004-06-10 Amir Peles Content security by network switch
US20040158429A1 (en) * 2003-02-10 2004-08-12 Bary Emad Abdel Method and system for classifying content and prioritizing web site content issues
US20040162876A1 (en) * 2003-02-14 2004-08-19 Whale Communications Ltd. System and method for providing conditional access to server-based applications from remote access devices
US20040177247A1 (en) * 2003-03-05 2004-09-09 Amir Peles Policy enforcement in dynamic networks
US20040250124A1 (en) * 2003-05-19 2004-12-09 Vsecure Technologies (Us) Inc. Dynamic network protection
US20050050362A1 (en) * 2003-08-13 2005-03-03 Amir Peles Content inspection in secure networks
US20050086206A1 (en) * 2003-10-15 2005-04-21 International Business Machines Corporation System, Method, and service for collaborative focused crawling of documents on a network
US20050120054A1 (en) * 2003-12-02 2005-06-02 Imperva, Inc Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications
US20050132030A1 (en) * 2003-12-10 2005-06-16 Aventail Corporation Network appliance
US20050144481A1 (en) * 2003-12-10 2005-06-30 Chris Hopen End point control
US20050188215A1 (en) * 2004-02-20 2005-08-25 Imperva, Inc. Method and apparatus for high-speed detection and blocking of zero day worm attacks
US20050262063A1 (en) * 2004-04-26 2005-11-24 Watchfire Corporation Method and system for website analysis
US20060029016A1 (en) * 2004-06-29 2006-02-09 Radware Limited Debugging application performance over a network

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050267779A1 (en) * 2004-05-31 2005-12-01 Samsung Electronics Co., Ltd. Method, apparatus, and medium for servicing clients in remote areas
US8132176B2 (en) 2004-09-30 2012-03-06 Citrix Systems, Inc. Method for accessing, by application programs, resources residing inside an application isolation scope
US20060085789A1 (en) * 2004-09-30 2006-04-20 Laborczfalvi Lee G Method and apparatus for moving processes between isolation environments
US20060090171A1 (en) * 2004-09-30 2006-04-27 Citrix Systems, Inc. Method and apparatus for virtualizing window information
US20060174223A1 (en) * 2004-09-30 2006-08-03 Muir Jeffrey D Method and environment for associating an application with an isolation environment
US7752600B2 (en) 2004-09-30 2010-07-06 Citrix Systems, Inc. Method and apparatus for providing file-type associations to multiple applications
US20060265714A1 (en) * 2004-09-30 2006-11-23 Bissett Nicholas A Methods and systems for accessing, by application programs, resources provided by an operating system
US20060069662A1 (en) * 2004-09-30 2006-03-30 Citrix Systems, Inc. Method and apparatus for remapping accesses to virtual system resources
US8042120B2 (en) 2004-09-30 2011-10-18 Citrix Systems, Inc. Method and apparatus for moving processes between isolation environments
US8171479B2 (en) 2004-09-30 2012-05-01 Citrix Systems, Inc. Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers
US20070094667A1 (en) * 2004-09-30 2007-04-26 Bissett Nicholas A Method for accessing, by application programs, resources residing inside an application isolation environment
US8117559B2 (en) 2004-09-30 2012-02-14 Citrix Systems, Inc. Method and apparatus for virtualizing window information
US8302101B2 (en) 2004-09-30 2012-10-30 Citrix Systems, Inc. Methods and systems for accessing, by application programs, resources provided by an operating system
US8352964B2 (en) 2004-09-30 2013-01-08 Citrix Systems, Inc. Method and apparatus for moving processes between isolation environments
US9071570B2 (en) * 2005-03-30 2015-06-30 International Business Machines Corporation Method and apparatus to select and deliver portable portlets
US20060230059A1 (en) * 2005-03-30 2006-10-12 International Business Machines Corporation Method and apparatus to select and deliver portable portlets
US20070067321A1 (en) * 2005-09-19 2007-03-22 Bissett Nicholas A Method and system for locating and accessing resources
US8095940B2 (en) 2005-09-19 2012-01-10 Citrix Systems, Inc. Method and system for locating and accessing resources
US20070083655A1 (en) * 2005-10-07 2007-04-12 Pedersen Bradley J Methods for selecting between a predetermined number of execution methods for an application program
US20070083522A1 (en) * 2005-10-07 2007-04-12 Nord Joseph H Method and a system for responding locally to requests for file metadata associated with files stored remotely
US8131825B2 (en) 2005-10-07 2012-03-06 Citrix Systems, Inc. Method and a system for responding locally to requests for file metadata associated with files stored remotely
US20070216935A1 (en) * 2006-03-17 2007-09-20 Fuji Xerox Co., Ltd. Image forming apparatus, printing system, job execution system, and job execution method
US8228521B2 (en) * 2006-03-17 2012-07-24 Fuji Xerox Co., Ltd. Data processing apparatus, printing system, job execution system, and job execution method
US20090254900A1 (en) * 2006-07-13 2009-10-08 Seiko Epson Corporation Network system, computers, and method and program for providing and executing applications in network system
US20080244718A1 (en) * 2007-03-30 2008-10-02 Simon Frost Systems and Methods for User Login
US8020195B2 (en) * 2007-03-30 2011-09-13 Citrix Systems, Inc. Systems and methods for user login
WO2009002678A3 (en) * 2007-06-22 2009-02-19 Citrix Systems Inc Methods and servers for displaying and activating disconnected sessions
US20080320145A1 (en) * 2007-06-22 2008-12-25 Juan Rivera Methods and Servers for Displaying and Activating Disconnected Sessions
WO2009002678A2 (en) * 2007-06-22 2008-12-31 Citrix Systems, Inc. Methods and servers for displaying and activating disconnected sessions
US8127017B2 (en) * 2007-06-22 2012-02-28 Citrix Systems, Inc. Methods and servers for displaying and activating disconnected sessions
US9009720B2 (en) 2007-10-20 2015-04-14 Citrix Systems, Inc. Method and system for communicating between isolation environments
US8171483B2 (en) 2007-10-20 2012-05-01 Citrix Systems, Inc. Method and system for communicating between isolation environments
US9009721B2 (en) 2007-10-20 2015-04-14 Citrix Systems, Inc. Method and system for communicating between isolation environments
US20090106780A1 (en) * 2007-10-20 2009-04-23 Nord Joseph Method and system for communicating between isolation environments
US9021494B2 (en) 2007-10-20 2015-04-28 Citrix Systems, Inc. Method and system for communicating between isolation environments
US8326943B2 (en) 2009-05-02 2012-12-04 Citrix Systems, Inc. Methods and systems for launching applications into existing isolation environments
US20100281102A1 (en) * 2009-05-02 2010-11-04 Chinta Madhav Methods and systems for launching applications into existing isolation environments
US8090797B2 (en) 2009-05-02 2012-01-03 Citrix Systems, Inc. Methods and systems for launching applications into existing isolation environments
US20110113089A1 (en) * 2009-11-09 2011-05-12 Apple Inc. Delivering media-rich-invitational content on mobile devices
WO2011138240A1 (en) * 2010-05-03 2011-11-10 Evidian Method for opening a session of a machine belonging to a machine set
US9866559B2 (en) 2010-05-03 2018-01-09 Evidan Method for opening a session of a machine belonging to a machine set
FR2959632A1 (en) * 2010-05-03 2011-11-04 Evidian Logon Method from a machine belonging to a machinery
US9462466B2 (en) * 2011-09-29 2016-10-04 Israel L'Heureux Gateway router supporting session hand-off and content sharing among clients of a local area network
US20140254546A1 (en) * 2011-09-29 2014-09-11 Israel L'Heureux Gateway router supporting session hand-off and content sharing among clients of a local area network
JP2014146294A (en) * 2013-01-30 2014-08-14 Seiko Epson Corp Control system and control method for control system
US20150365272A1 (en) * 2013-01-30 2015-12-17 Seiko Epson Corporation Control System, Control Method of a Control System, and Control Device
JP2014146290A (en) * 2013-01-30 2014-08-14 Seiko Epson Corp Control device and control method for control device
US9848325B2 (en) * 2014-07-14 2017-12-19 Sony Corporation Enabling secure application distribution on a (E)UICC using short distance communication techniques
US20160014601A1 (en) * 2014-07-14 2016-01-14 Sony Corporation Enabling secure application distribution on a (e)uicc using short distance communication techniques
US9639680B2 (en) * 2014-07-29 2017-05-02 Google Inc. Allowing access to applications based on user handling measurements
US9639681B2 (en) 2014-07-29 2017-05-02 Google Inc. Allowing access to applications based on captured images
US9684776B2 (en) 2014-07-29 2017-06-20 Google Inc. Allowing access to applications based on user authentication
US9690919B2 (en) 2014-07-29 2017-06-27 Google Inc. Allowing access to applications based on user capacitance
US20160034674A1 (en) * 2014-07-29 2016-02-04 Google Inc. Allowing access to applications based on user handling measurements
US9965609B2 (en) * 2014-07-29 2018-05-08 Google Llc Allowing access to applications based on user handling measurements
US20170006021A1 (en) * 2015-06-30 2017-01-05 Vmware, Inc. Providing a single session experience across multiple applications

Also Published As

Publication number Publication date Type
EP2000905A1 (en) 2008-12-10 application
US7594018B2 (en) 2009-09-22 grant
US20100011113A1 (en) 2010-01-14 application
WO2005038649A3 (en) 2005-09-29 application
JP2007508617A (en) 2007-04-05 application
EP1671226A2 (en) 2006-06-21 application
US8078689B2 (en) 2011-12-13 grant
CA2541987A1 (en) 2005-04-28 application
WO2005038649A2 (en) 2005-04-28 application
KR20060131739A (en) 2006-12-20 application

Similar Documents

Publication Publication Date Title
US6085192A (en) System and method for securely synchronizing multiple copies of a workspace element in a network
US7366779B1 (en) Direct file transfer between subscribers of a communications system
US6327613B1 (en) Method and apparatus for sharing peripheral devices over a network
US8254992B1 (en) Wireless docking system and pairing protocol for multiple dock environments
US6708221B1 (en) System and method for globally and securely accessing unified information in a computer network
US7089313B2 (en) Protocol independent communication system for mobile devices
US6446091B1 (en) Method and apparatus for undeleting files in a computer system
US7181492B2 (en) Transfer of an internet chat session between servers
US6957249B2 (en) Secure remote access to enterprise networks employing enterprise gateway servers
US6868544B2 (en) Method and system for general-purpose interactive notifications
US20040199580A1 (en) Method and apparatus for dynamic audio and Web conference scheduling, bridging, synchronization, and management
US20040193695A1 (en) Secure remote access to enterprise networks
US7266594B2 (en) Method and system for configuring a computer for real-time communication
US20040083281A1 (en) Method and apparatus for providing real-time communication center reporting data to third-party applications over a data network
US6212160B1 (en) Automated selection of a protocol by a communicating entity to match the protocol of a communications network
US6466252B1 (en) Video conference system, and its reservation server, control unit, video conference terminal equipment, and storage medium stored therein program thereof
US7287083B1 (en) Computing environment failover in a branch office environment
US20030084169A1 (en) System and method for accessing a target computer from a remote location using a remote computer
US20070005809A1 (en) Network information processing system and network information processing method
US20050223075A1 (en) Method and system for authorizing a restricted callable status in an instant messaging system
US20040107272A1 (en) Method and system for automatically configuring a client-server network
US20020152377A1 (en) System console device authentication in a network environment
US6189032B1 (en) Client-server system for controlling access rights to certain services by a user of a client terminal
US20050188095A1 (en) System for managing server user operation sessions
US20080256224A1 (en) Data communication system and session management server

Legal Events

Date Code Title Description
AS Assignment

Owner name: CITRIX SYSTEMS, INC., FLORIDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PEDERSEN, BRADLEY JAY;REEL/FRAME:014422/0133

Effective date: 20031009

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8